Inferring Internet denial-of-service activity

@article{Moore2006InferringID,
  title={Inferring Internet denial-of-service activity},
  author={D. Moore and G. Voelker and S. Savage},
  journal={ACM Trans. Comput. Syst.},
  year={2006},
  volume={24},
  pages={115-139}
}
In this article, we seek to address a simple question: “How prevalent are denial-of-service attacks in the Internet?” Our motivation is to quantitatively understand the nature of the current threat as well as to enable longer-term analyses of trends and recurring patterns of attacks. We present a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity. We use this approach on 22 traces (each covering a week or more) gathered… Expand
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
Preventing Internet denial-of-service with capabilities
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks
Methods and Systems for Understanding Large-Scale Internet Threats
...
1
2
3
4
5
...

References

SHOWING 1-4 OF 4 REFERENCES
Cisco NetFlow. Cisco IOS Documentation
  • Cisco NetFlow. Cisco IOS Documentation
  • 2004
Network IngressFiltering: DefeatingDenial of ServiceAttacks Which Employ IP SourceAddressSpoofing
  • RFC 2827,
  • 2000
Unicast Reverse Path Forwarding
  • Cisco IOS Documentation
  • 1999
Unicast Reverse Path Forwarding. Cisco IOS Documentation
  • Unicast Reverse Path Forwarding. Cisco IOS Documentation
  • 1999